Implementation and Design of SHA-1 Algorithm
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA- 1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.
Authors and Affiliations
Chandra sekhar murala| Research scholar(M.Tech), Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem chandumurala@gmail.com, M. Purnasekhar| Asst. professor Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem
We propose a shared data based algorithm that analytically chooses the optimal feature for classification. This common information based component choice calculation can manage straightly and nonlinearly subordinate...
New Topology For Hybrid Wind-Solar Energy System
Preventing Environmental pollution is becoming a tough task to the scientist. This paper presents a new system configuration which allows the two sources to supply the load separately or simultaneously depending on t...
Solar PV and Battery Storage Integration System Using Three Level NPC Inverter
In this work, another setup of a three-level neutral pointclipped (NPC) inverter that can incorporate sun powered photovoltaic (PV) with battery stockpiling in a lattice associated framework is proposed. The quality of...
Secure Key Distribution And Data Sharing For Dynamic Groups In Cloud To Protect From Collusion Attack
Sharing group resource among cloud clients is a noteworthy issue, so cloud computing gives a economical and creative planning, Because of regular change of participation, sharing information in a multi-proprietor way...
Compressed Sensing Based Computed Tomography Image Reconstruction
In computed tomography (CT), an important objective is to reduce radiation dose without degrading image quality. The radiation exposure from CT scan will make severe problem in humans. This has high risk in the case...